First published: Thu Dec 03 2009(Updated: )
PEDAMACHEPHEPTOLIONES and D.B. COOPER found a stack-based buffer overflow, present in Xfig, Transfig by loading malformed .FIG files. A remote attacker could provide a specially-crafted .FIG text object file, which once opened by a local, unsuspecting user would lead to denial of service (Xfig, fig2dev crash). References: ----------- <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274</a> Fortran PoC by PEDAMACHEPHEPTOLIONES: ------------------------------------- <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=xfig_poc.f;att=1;bug=559274">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=xfig_poc.f;att=1;bug=559274</a> CVE was requested here: ----------------------- <a href="http://www.openwall.com/lists/oss-security/2009/12/03/2">http://www.openwall.com/lists/oss-security/2009/12/03/2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xfig Xfig | =3.2.5 | |
Xfig Xfig | <=3.2.5b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.